Methods and systems for ensuring printer looses ability to print security patterns if disconnected from approved system

Turner , et al. June 26, 2

Patent Grant 10007794

U.S. patent number 10,007,794 [Application Number 14/185,378] was granted by the patent office on 2018-06-26 for methods and systems for ensuring printer looses ability to print security patterns if disconnected from approved system. This patent grant is currently assigned to CTPG OPERATING, LLC. The grantee listed for this patent is CTPG Operating, LLC. Invention is credited to Robert Delaney, John E. Tarbotton, Kyle Turner.


United States Patent 10,007,794
Turner ,   et al. June 26, 2018

Methods and systems for ensuring printer looses ability to print security patterns if disconnected from approved system

Abstract

The present invention relates to a method and system used to ensure that a printer which is capable of printing security patterns loses its ability to print these patterns if the printer is disconnected from an approved system and, more particularly, to a method and system including a printer containing an encrypted key and password loaded into its memory, where the stored password must match a password present in a data stream sent from the host software application in order to print a requested print job.


Inventors: Turner; Kyle (Lake Forest, IL), Delaney; Robert (Ithaca, NY), Tarbotton; John E. (Ithaca, NY)
Applicant:
Name City State Country Type

CTPG Operating, LLC

Ithaca

NY

US
Assignee: CTPG OPERATING, LLC (Ithaca, NY)
Family ID: 53368824
Appl. No.: 14/185,378
Filed: February 20, 2014

Prior Publication Data

Document Identifier Publication Date
US 20150169884 A1 Jun 18, 2015

Related U.S. Patent Documents

Application Number Filing Date Patent Number Issue Date
61916347 Dec 16, 2013

Current U.S. Class: 1/1
Current CPC Class: G06F 3/1238 (20130101); H04L 63/083 (20130101); G06F 21/608 (20130101); G06F 3/1222 (20130101)
Current International Class: G06F 21/60 (20130101); H04L 29/06 (20060101); G06F 3/12 (20060101)
Field of Search: ;358/1.13-1.15

References Cited [Referenced By]

U.S. Patent Documents
6362893 March 2002 Francis
7667865 February 2010 Ciriza
8005936 August 2011 Motoyama
8316231 November 2012 Aaron
8319990 November 2012 Miyazaki
8325921 December 2012 Fan
8429416 April 2013 Ooi
8554090 October 2013 Cachia
8593688 November 2013 Simske
8614836 December 2013 Simske
2002/0051167 May 2002 Francis
2002/0184519 December 2002 Wadley
2003/0053815 March 2003 Testardi
2005/0094182 May 2005 Reese
2010/0002249 January 2010 Nuggehalli
2011/0026065 February 2011 Bard
2011/0051182 March 2011 Sugiyama
2012/0213369 August 2012 Rich
2012/0219151 August 2012 Mano
Foreign Patent Documents
2454211 May 2009 GB
H07184068 Jul 1995 JP
200022150 Aug 2000 JP
2003029955 Jan 2003 JP

Other References

Fridrich, J., Goljan, M., Soukal, D., Searching for the Stego-Key, SUNY Binghamton, Dec. 30, 2013, pp. 70-82, http://proceedings/spiedigitallibrary.org. cited by applicant .
Sharp, T., An Implementation of Key-Based Digital Signal Steganography. cited by applicant .
PCT International Search Report dated Mar. 31, 2015. cited by applicant.

Primary Examiner: Yip; Kent
Attorney, Agent or Firm: Bond Schoeneck & King, PLLC McGuire; George Gray; Jonathan

Parent Case Text



RELATED APPLICATION

The present application claims priority to U.S. Provisional Patent Application Ser. No. 61/916,347, filed Dec. 16, 2013, the entirety of which is hereby incorporated by reference.
Claims



What is claimed is:

1. A digital printer structured or programmed to print at least a first security feature on a substrate comprising: a first identifier uniquely identifying the digital printer, wherein the first identifier is a serial number of the printer; a memory configured to store the first identifier; a key code loaded into said memory; a first password loaded into said memory; and a non-transitory computer-readable storage medium having program code for checking a first condition to determine whether a second password is located in a header of a data stream received by said digital printer from a host; wherein said non-transitory computer-readable storage medium has program code for checking a second condition to determine whether said second password matches said first password, said non-transitory computer-readable storage medium having program code for printing said first security feature on the substrate only if at least said first and second conditions are met; and program code for denying access to the security feature stored in memory if the key code loaded into memory does not match a predetermined key code, wherein said predetermined key code is associated with said first identifier such that the predetermined key code is unique to the digital printer.

2. The digital printer of claim 1, wherein said non-transitory computer-readable storage medium has program code for checking a third or a fourth condition to determine whether said first password is present within said memory; and wherein said non-transitory computer-readable storage medium has program code for printing said first security feature on the substrate only if said first, second, third and fourth conditions are met.

3. The digital printer of claim 1, wherein said first security feature comprises a security feature selected from the group consisting of pantographs, watermarks, microprinting, verification grids, validation marks, color, uv marks, IR marks, barcodes, anti-copying marks, and any combination thereof.

4. The digital printer of claim 3, wherein said anti-copying mark is an Eurion mark.

5. The digital printer of claim 1, wherein at least one of said key code, said first password and said second password can be changed by an authorized user of the digital printer.

6. A method of printing at least a first security feature on a substrate comprising the steps of: providing a digital printer structured or programmed to print at least a first security feature on a substrate comprising a first identifier, wherein the first identifier is a serial number of the printer, a memory configured to store the first identifier, a key code loaded into said memory, wherein said key code is associated with said first identifier, and a first password loaded into said memory; checking by a processor a first condition to determine whether a second password is located in a header of a data stream received by said digital printer from a host; and checking by a processor a second condition to determine whether said second password matches said first password; printing said first security feature on the substrate only if at least said first and second conditions are met; checking by a processor to determine whether the key code matches a predetermined key code; and denying access to the security feature stored in memory if the key code loaded into memory does not match a predetermined key code, wherein said predetermined key code is associated with said first identifier such that the predetermined key code is unique to the digital printer.

7. The method of claim 6, further comprising the steps of checking by a processor a third or a fourth condition to determine whether said first password is present within said memory; and printing said first security feature on the substrate only if said first, second, third and fourth conditions are met.

8. The method of claim 6, wherein said first identifier comprises a first serial number.

9. The method of claim 8, wherein said first security feature comprises a security feature selected from the group consisting of pantographs, watermarks, microprinting, verification grids, validation marks, color, uv marks, IR marks, barcodes, serial numbers, anti-copying marks, and any combination thereof.

10. The method of claim 6, wherein at least one of said key code, said first password and said second password can be changed by an authorized user of the digital printer.
Description



BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to a method and system used to ensure that a printer which is capable of printing security patterns loses its ability to print these patterns if the printer is disconnected from an approved system and, more particularly, to a method and system including a printer containing an encrypted key and password loaded into its memory, where the stored password must match a password present in a data stream sent from the host software application in order to print a requested print job.

2. Description of the Related Art

Security patterns are used across a diverse marketplace to deter fraud, counterfeiting, and theft. Interpol estimates that worldwide counterfeit goods represent 5 to 7 percent of all world trade or $600 million annually. In most cases, these security patterns come pre-printed on digital print media. The digital print media must be stored in a secure location so that counterfeiters and thieves are not able to obtain the security patterns. If a counterfeiter was able to obtain the media, they would be free to print fraudulent security documents that would be very hard to detect.

There are digital printers that can print these secure patterns on demand on standard media. The advantage of these printers is that the standard media does not have to be secured and guarded against theft. Security patterns can be created on demand. However, the printer must be set up with features/methods that disable the printing of these security patterns if a thief were able to steal the printer.

Description of the Related Art Section Disclaimer: To the extent that specific patents/publications/products are discussed above in this Description of the Related Art Section or elsewhere in this Application, these discussions should not be taken as an admission that the discussed patents/publications/products are prior art for patent law purposes. For example, some or all of the discussed patents/publications/products may not be sufficiently early in time, may not reflect subject matter developed early enough in time and/or may not be sufficiently enabling so as to amount to prior art for patent law purposes. To the extent that specific patents/publications/products are discussed above in this Description of the Related Art Section and/or throughout the application, the descriptions/disclosures of which are all hereby incorporated by reference into this document in their respective entirety(ies).

SUMMARY OF THE INVENTION

Various embodiments of the present invention may be advantageous in that they may solve or reduce one or more of the potential problems and/or disadvantages with conventional unsecured digital printers that can print these secure patterns on demand on standard media.

Various embodiments of the present invention may exhibit one or more of the following objects, features and/or advantages:

It is a principal object and advantage of the present invention to provide a digital printer that can print these secure patterns on demand on standard media and includes features/methods that disable the printing of these security patterns if a thief were able to steal the printer.

In accordance with the foregoing principal object and advantage, an embodiment of the present invention is directed to a digital printer including one or more of the following. First, an encrypted key is loaded into its memory that is uniquely tied to the printer serial number, where the printer will open areas of its memory where the security patterns are stored when this key is present. The security patterns or features can include, for example, pantographs, watermarks, microprinting, verification grids, validation marks, color, uv and/or IR marks, unique barcodes, serial numbers, anti-copying marks such as an Eurion mark, any combination thereof, and any other security patter as should be understood by those of skill in the art. The key can also enable upgrades to the printer by opening up an area of the printer's memory to load, as well as retrieve, security patterns. Second, the printer can have a unique password loaded into its memory. With this password in its configuration memory, the printer will be configured to look for a matching password to be present in the header of the data stream sent from the host software application (preferably running on a computer separate from the printer). If the password is not present in the data stream, the printer will not print the security patterns. A customer setting up the printer for the first time is encouraged to make this password a unique alphanumeric password. In accordance with an embodiment of the present invention, the password and the key loaded into the memory, and the password that will be present in the data stream, can be changed by a user/owner of the printer (e.g., an authorized user),

This unique printer configuration has been designed to prevent unauthorized use of the printer. If a printer is stolen, the key will be present on the device, but when the thief attempts to print a security pattern; the host computer will not have the matching password in its header. Thus, the security pattern will not print. If a printer is purchased without the key and a customer attempts to print the security patterns, it will not print. They will need to purchase a license which provides them the key to load into the printer memory.

The details of one or more embodiments are described below and in the accompanying drawings. Other objects and advantages of the present invention will in part be obvious, and in part appear hereinafter.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will be more fully understood and appreciated by reading the following Detailed Description in conjunction with the accompanying drawings, in which:

FIG. 1 is (A) a flowchart showing a method of setting the printer and host system up to ensure only authorized secure patterns are printed, and (B) a flowchart showing the decision process the printer goes through to determine if a security pattern should be printed, according to an embodiment of the present invention.

FIG. 2 is a system architecture diagram of a digital printer capable of printing security features and its connection to a host computer, according to an embodiment of the present invention.

DETAILED DESCRIPTION

The present invention will be more fully understood and appreciated by reading the following Detailed Description in conjunction with the accompanying drawings, wherein like reference numerals refer to like components.

Turning to FIG. 1A-B, there is illustrated (A) a flowchart showing a method of setting the printer and host system up to ensure only authorized secure patterns are printed, and (B) a flowchart showing the decision process the printer goes through to determine if a security pattern should be printed, according to an embodiment of the present invention.

Turning to FIG. 2, a system architecture diagram of a digital printer 104 capable of printing security features is shown. The encrypted key that can be uniquely tied to the printer's 104 serial number can be loaded into memory 112. Security patterns can also be stored in the memory 112, and the encrypted key can be configured to open areas of the memory 112 where the security patterns are stored when the encrypted key is present. A unique password can also be stored in memory 112. A host computer 102 is also shown in FIG. 2. The host computer 102 can send a matching password in the header of a data stream 106 to the printer 104, as described herein.

While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood by those skilled in the art that the invention is not to be limited to the disclosed embodiment, it on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Turning to FIG. 1A-B, there is illustrated (A) a flowchart showing a method of setting the printer and host system up to ensure only authorized secure patterns are printed, and (B) a flowchart showing the decision process the printer goes through to determine if a security pattern should be printed, according to an embodiment of the present invention. Turning to FIG. 2 there is shown an embodiment of a system that may implement the flowcharts displayed in FIGS. 1A-B. As shown, the system may include a host computer 102 that is connected 106 to a digital printer 104 having a memory 112.

* * * * *

References


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed